Usually, char * entries are dangerous in traces because the stringcan be released whereas a pointer to it can still wait to be read fromthe ring buffer.

But sometimes we can assume it's safe, like in case of RO data(eg: __file__ or __line__, used in bkl trace event). If these RO dataare in a module and so is the call to the trace event, then it's safe,because the ring buffer will be flushed once this module get unloaded.